An automated framework provides security monitoring and analysis in a network by autonomously detecting actual and potential threats to the network. In response to detection of a threat, the framework instantiates a Situation to provide directed monitoring of the threat. The Situation invokes specific skills based on the state of the Situation to monitor network traffic for activity specific to the threat that instantiated the Situation. As data is collected, additional skills may be invoked based on the additional data to collect new data, and previously invoked skills may be terminated depending on the additional data to avoid collecting information that is no-longer relevant.
|
18. A method comprising:
detecting activity that represents a threat; and
tracking the threat absent input from the user, including:
(a) selecting, from among a plurality of monitor processes, a set of monitor processes based on one or more artifacts maintained in a tracking data object for the threat, wherein the one or more artifacts correspond to a threat state of the threat, wherein each of the one or more artifacts includes artifact metadata specifying an object or action associated with the threat state and a role assigned to the object or action with respect to the threat state, and wherein the selecting comprises matching selection criteria defined for the one or more first data monitoring processes to the artifact metadata included in the one or more artifacts;
(b) invoking the set of monitor processes and updating the threat state of the threat based on activity detected by the set of monitor processes;
(c) changing the set of monitor processes in response to the updating; and
(d) repeating (b) and (c).
12. A device in a network comprising:
one or more computer processors; and
a computer-readable storage medium comprising instructions for controlling the one or more computer processors to:
(a) detect activity that represents a threat;
(b) instantiate a tracking data object for the threat, wherein the tracking data object comprising one or more artifacts corresponding to a threat state of the threat, and wherein each of the one or more artifacts includes artifact metadata specifying an object or action associated with the threat state and a role assigned to the object or action with respect to the threat state;
(c) select, from among a plurality of monitor processes, a set of monitor processes based the one or more artifacts in the tracking data object, wherein the selecting comprises matching selection criteria defined for the set of monitor processes to the artifact metadata included in the one or more artifacts;
(d) invoke the set of monitor processes and update the threat state of the threat based on activity detected by the set of monitor processes;
(e) change the set of monitor processes based on the updated threat state of the threat; and
(f) repeat (d) and (e).
1. A method for monitoring a threat in a network, the method comprising:
instantiating a tracking data object to represent and track the threat, wherein the tracking data object comprises one or more artifacts corresponding to a threat state of the threat, and wherein each of the one or more artifacts includes artifact metadata specifying an object or action associated with the threat state and a role assigned to the object or action with respect to the threat state;
selecting, from among a plurality of data monitoring processes, one or more first data monitoring processes based on the one or more artifacts in the tracking data object, wherein the selecting comprises matching selection criteria defined for the one or more first data monitoring processes with the artifact metadata included in the one or more artifacts;
invoking the one or more first data monitoring processes to detect events in the network and to monitor network traffic in the network including network traffic associated with the one or more artifacts;
updating the threat state of the threat in accordance with data collected by the one or more first data monitoring processes; and
selecting and invoking additional data monitoring processes based on updates to the threat state of the threat.
2. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
a confidence score indicating a likelihood that the role assigned to the object or action is correct; and
a text field specifying a reason why the role was assigned.
10. The method of
11. The method of
13. The network device of
14. The network device of
15. The network device of
16. The network device of
17. The network device of
19. The method of
20. The method of
|
This application is related to the following commonly owned U.S. Applications, the content of which are incorporated herein by reference in their entireties for all purposes:
Security analysis is a critical component of any company or organization with assets (whether digital, physical, or both) that must be protected. The current state of the art is to have one or more security products that provide the security analyst with information (e.g., alerts) about events in the environment which may have relevance to the security of their assets. These products provide varying levels and types of alerts, though most have highly-specific alerts and do not provide higher-level context. Tools that have more contextually-rich alerts provide context only around a small number (often, one) of events that are linked together in an environment. The security analyst typically spends most of their time attempting to piece together the disparate pieces of information from these systems and validate them by cross-checking them with each other and with other sources of information available to the analyst. The effort is repetitive, time-consuming, and error-prone because of the scope of information to be covered and the ability of adversaries to rapidly change their tactics.
With respect to the discussion to follow and in particular to the drawings, it is stressed that the particulars shown represent examples for purposes of illustrative discussion, and are presented in the cause of providing a description of principles and conceptual aspects of the present disclosure. In this regard, no attempt is made to show implementation details beyond what is needed for a fundamental understanding of the present disclosure. The discussion to follow, in conjunction with the drawings, makes apparent to those of skill in the art how embodiments in accordance with the present disclosure may be practiced. Similar or same reference numbers may be used to identify or otherwise refer to similar or same elements in the various drawings and supporting descriptions. In the accompanying drawings:
The present disclosure describes a security platform that provides a modular and extensible framework that allows any of the above-mentioned alerts to be contextualized for a given environment in an automated manner. Such a framework is beneficial because it allows for arbitrary creation of automated “skills” that the framework can decide whether or not to run based on any analysis that has already been performed as well as new information becoming available. This reduces the amount of work that is performed on activity that has been identified as uninteresting (a “False Positive”) while using more resources to further contextualize behavior that is interesting (a “True Positive”). The independence and flexibility of the framework allows the automation to make these decisions much like an experienced human analyst would, thereby freeing the human analyst to focus more on undiscovered threats and preventative measures.
The framework operates on a tracking data object, called a Situation, to track data that has been associated with the threat in the course of both automated and human manual analysis. For each piece of data the Situation records, the role of the data in the attack, the confidence in the assignment of that role, and the reason for that assignment. This information constitutes the data that the automation framework uses to select further skills (analysis and monitoring) to be performed as well as to record the results of that analysis in a form a human analyst can easily understand.
A security knowledge graph provides a source of knowledge of the network being monitored. The security knowledge graph evolves as information about the network flows into the security platform.
In the following description, for purposes of explanation, numerous examples and specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. Particular embodiments as expressed in the claims that follow this description may include some or all of the features in these examples, alone or in combination with other features described below, and may further include modifications and equivalents of the features and concepts described herein.
Network 100 can include one or more firewalls 106 to provide hosts 112 and servers 114 with access to one or more external (untrusted) networks 12, such as the Internet, to reach external servers 14 which represent potential bad actors. In accordance with some embodiments, each firewall 106 can be associated with a network tap device 104. Network devices 116 (and in some instances hosts 112 and/or servers 114) can connect to network tap devices 104 associated with respective firewalls 106 to mirror or otherwise replicate network traffic that flows into and out of network 100 to security appliance 102; e.g., packets between hosts 112 and external servers 14. Although not shown in the figure, network tap devices can be located within network 100, not just at the edge. Locating network taps within the network allows traffic among hosts 112 and servers 114 to be mirrored to security appliance 102. In some embodiments, network tap functionality can be incorporated into devices comprising network 100, such as routers and switches, to mirror traffic flowing through those devices to security appliance 102.
Aspects of security appliance 102 are described, for example, in commonly owned U.S. Pat. No. 10,218,717, which is incorporated herein by reference. Briefly, security appliance 102 can be configured to monitor potential threats to network 100, evaluate identified potential threats, issue alerts, and initiate/recommend corrective action as needed. In accordance with the present disclosure, security appliance 102 can include an automation framework (
Referring to
In accordance with the present disclosure, automation framework 200 can include a situation engine 202 to drive a Situation through its various states; e.g., from instantiation of the Situation, to investigation of the Situation, to reviewing the Situation, and to remediation and closing out of the Situation. A Situation can be instantiated by a user such as a network administrator, threat analyst, and the like.
In accordance with the present disclosure, a Situation can be automatically instantiated absent input from a user. In some embodiments, for example, automation framework 200 can include activity monitor 204 to monitor traffic flow (packets) and events in network 100 to detect a threat. Events include activity that can be derived from the network data such as the first time a device or domain was observed communicating on the network, model matches that have occurred for a device, indicator of compromise (IOC) matches that have occurred for a device, etc. The activity monitor can comprise one or more background processes that monitor network activity, and based on the monitored information, the activity monitor can autonomously trigger situation engine 202 to instantiate a Situation (e.g., 212) to track suspect activity. In some embodiments, for example, activity monitor 204 can monitor traffic flow information collected by network tap devices 104.
Automation framework 200 can further include a set of responder skills 206 that can be invoked by situation engine 202. Responder skills 206 (or simply “skills”) can monitor activity in network 100 and provide telemetry to develop an instantiated Situation. Activity that can be monitored includes network traffic among the nodes comprising network 100, such as computing devices, network devices, firewalls, etc. For example, a skill can be programmed or otherwise configured to look for specific packets based on source of the packet (e.g., using the source IP address or a source MAC address), the destination of the packet, and so on. Responder skills can monitor data in the network, for example data in security knowledge graph 210, and update instantiated Situations with information about the network.
Automation framework 200 can further include situation visualizer 208 to provide a user with various views of an instantiated Situation. In some embodiments, for example, visualizer 208 can generate an attack sequence, which represents the progress of a Situation in terms of a sequence of messages and events associated with the Situation. Visualizer 208 can generate an attack map, which represents a visual representation of interconnected pieces of a threat to the environment, based on the relationships among security knowledge graph entities relevant to the threat documented in the Situation. It will include objects such as devices, domains, IP addresses, documentation, and users.
In some embodiments, security appliance 102 can include security knowledge graph 210. The security knowledge graph can associate any information that flows into security appliance 102 with nodes in network 100 that have relationships with other nodes in the network. Aspects of SKG 210 are described, for example, in commonly owned U.S. Pat. No. 10,218,717. Briefly, network traffic (packets) mirrored by tap device(s) 104 and provided to security appliance 102 can be analyzed to identify entities (e.g., hosts 112, servers 114, etc.) comprising network 100, usernames, domains, etc. The identified information can be used to build security knowledge graph 210, and as the network traffic continues to be monitored by the network tap devices, the data associated with those entities continue to evolve in the security knowledge graph. Situation engine 102 and invoked skills 224 can access the data collected by security knowledge graph 210 to inform the analysis and decisioning making process for a Situation being monitored. This separation of functionality allows the security knowledge graph to develop a representation of the environment in which security threats evolve without having to take into consideration the specifics of a given threat, and at the same time allows the situation engine to focus on the specifics of each threat being analyzed.
Situation engine 202 can invoke a situation instance to monitor threats that are (1) manually identified by a user or (2) automatically identified by activity monitor 204. As shown in
Although
The discussion will now turn to a description of situation tracking object 222 in accordance with the present disclosure. The situation tracking object can serve to document the information collected for a Situation to develop an understanding of the Situation. Data stored in the situation tracking object can serve as pivot points to additional information vis-à-vis security knowledge graph 210 to facilitate automated hunting by skill or manual hunting by users to further develop an understanding of the Situation. The current values of the data contained in the situation tracking object represent a current threat state of the threat that is being tracked.
Entity and Artifact Overview
In accordance with the present disclosure, situation tracking object 222 can include entities and artifacts. Artifacts are the objects that are involved in a Situation. Artifacts can be physical things (e.g., computing devices, network devices, etc.) or logical elements (e.g., IP address, actions, etc.). In some embodiments, artifacts can be divided into three types or categories:
In some embodiments, object artifacts can be referred to as entities in that they that they represent things that are taking action or being acted upon. The distinction between an object artifact and an entity is the level of abstraction from the concrete hardware/software representation. For example, an IP address can be referred to as an object artifact because it is a number used as an identifier by hardware/software. A device, on the other hand, can be referred to as an entity because it represents a real-world concept that we infer from the IP address and other artifacts it produces as it goes about its business. Other than this level of abstraction distinction, entities and object artifacts can be treated the same.
In some embodiments, object artifacts include, but are not limited to:
In some embodiments, action artifacts include, but are not limited to:
In some embodiments, informational/documentation artifacts include, but are not limited to:
In some embodiments, artifacts 302 (e.g., devices, usernames, domains, etc.) that can be added to the Situation can be recorded in the situation tracking object as references to the artifact's record in security knowledge graph (SKG) 210. The data associated with artifacts in the SKG continue to evolve independently of Situations being monitored. Situation engine 202 can make use of that data as responder skills are invoked by following the references from the situation tracking object to the SKG. This separation of functionality allows the SKG implementation to focus on accurately describing the environment in which security threats evolve without having to take into consideration the specifics of a given threat. The situation engine is then free to focus on the specifics of each kind of threat being analyzed.
Adding Entities and Artifacts to the Situation Tracking Object
Artifacts 302 can be added to situation tracking object 222 by invoked skills 224 in automated fashion as they monitor network traffic and events occurring in network 100. Users can manually add data to the situation tracking object as well. Each entry 306 in the situation tracking object represents an artifact. Each artifact can have associated metadata 304 to provide additional context for the artifact. The metadata can be added at the time the artifact is added, or subsequent to when the artifact is added. An illustrative list of metadata 304 for a given artifact in a given entry includes, but is not limited to:
In accordance with aspects of the present disclosure, artifacts are assigned to or otherwise associated with roles. As the name suggests, the “role” of an artifact in a Situation represents its purpose or participation (involvement) in the Situation. The role or roles assigned to artifacts in a Situation influence the selection and termination of responder skills. Roles influence risk score calculation. Roles influence the selection and placement of those artifacts in the attack sequence and attack map. Following are illustrative roles (referred to as “role values”) for artifacts in a Situation. In some embodiments, for example, role values for entities and object artifacts include, but are not limited to:
In some embodiments, role values for action artifacts include, but are not limited to:
In some embodiments, role values for informational artifacts include, but are not limited to:
Referring to
At operation 402, the automation framework can instantiate a Situation. In some embodiments, for example, situation engine 200 can create a situation tracking object to instantiate a Situation. In accordance with some embodiments, a background (automated) monitoring process such as activity monitor 204 can trigger the situation engine to instantiate a Situation in response to detecting a threat in network 100, whether actual or potential. A user can also manually trigger a Situation, for example, via a suitable user interface.
In some embodiments, the situation engine can initialize the situation tracking object (e.g.,
At operation 404, the automation framework can invoke one or more responder skills 224 to identify additional information relevant to the artifacts or entities in the Situation. In some embodiments, the purpose of the activity monitor and the purpose of responder skills can be different. In some embodiments, for example, the role of the activity monitor can be to detect activity in the network that should be monitored via a Situation. This allows the activity monitor to use broad detection criteria to encompass a wide range of activity in order to catch suspected potential threats in addition to looking for known actual threats. The role of responder skills, on the other hand, can be to monitor the network for more specific targeted activity once a suspected threat has been detected in order to make a more accurate assessment of that threat. Because some information can be too expensive to continuously monitor and calculate, responder skills can also look at historical data collected by the system to determine whether a related event has occurred for an artifact that is in the Situation.
Accordingly, in some embodiments, the situation engine can determine which responder skills to invoke based on the artifacts and their metadata stored in the situation tracking object. For example, responder skills can be selected based on the specific roles associated with the artifacts in the situation tracking object. Merely to illustrate how a responder skill might be selected, for example, available responder skills can be listed in a table. Each responder skill can be associated with one or more selection criteria. A responder skill may be associated with the criterion “
At operation 406, the automation framework can update the situation tracking object with information collected from the invoked responder skills. In some embodiments, for example, responder skills can write to their corresponding situation tracking object. For instance, a responder skill may detect additional IP addresses that are relevant to the Situation; e.g., the IP addresses of the devices of recipients of a phishing attack. The additional IP addresses can be added to the Situation by creating new entries in the situation tracking object for each IP address. More generally, responder skills can be configured to identify/detect new artifacts that the situation engine can add to the situation tracking object; this is referred to as “expanding” the Situation. Responder skills can also collect information to further enhance existing artifacts recorded in the situation tracking object; this is referred to as “enriching” the Situation. For example, responder skills may alter the roles of artifacts in the situation tracking object, or add or delete roles associated with artifacts in the situation tracking object.
Because responder skills are invoked based on the information already collected for a Situation, the invoked responder skills are more likely to collect data that is relevant to the current state of the Situation and thus more likely to succeed in developing a Situation that more accurately tracks the threat than generic traffic monitoring approaches. For example, the automation framework can optimize resource utilization and discover more relevant information at a significantly lower system resource demand (and thus cost to the customer).
Responder skills can be program modules that execute as independent processes in the computing environment of automation framework 200. Merely to illustrate, for example, a responder skill can monitor an IP address (object artifact) to update its role, reason, and confidence metadata. Another responder skill can add usernames to devices that were identified as communicating with a suspect destination, for example, using the Relationship metadata. A responder skill that was developed to perform a specific function for a particular Situation might have utility beyond the specific Situation for which it was designed. That skill can be added to the set of responder skills 204, thus expanding the repertoire of data collection functions that situation engine 202 can access. While there are responder skills that are intended to uncover specific kinds of threats, we can structure the responder processing as generically as possible so that the responder skills are likely to update situations with useful relevant information regardless of whether the exact threat has been seen previously.
Merely to illustrate, responder skills can provide the following data collection functions:
In some embodiments, skills can access security knowledge graph (SKG) 210 to identify relations to other artifacts in the network, for example, to look for commonalities between devices recorded in the situation tracking object with other devices in the network. Skills can use the SKG for a suspicious domain to determine all devices which visited that domain, as they are attributes of that domain's entry in the SKG. Skills can identify Users associated with a particular Device (which would be attributes of the Device's node in the SKG) at a time where it was believed a threat occurred. The SKG artifact for a domain records the IP addresses the devices that have communicated with that domain. Skills can use this information to expand the situation with additional devices that might be involved due to the common use of a malicious domain. Skills can look at the first-seen information recorded in the SKG for an entity or artifact and to determine whether it might have been observed as a result of malicious activity that has already been identified around that time. Skills can look at other relationships that might tie entities together such as a common domain registrar, TLS certificate organization, etc.
At operation 408, the automation framework can update the situation tracking object with information manually entered by a user, such as a threat analyst. In some embodiments, for example, the situation engine can include a UI or a web interface that allows users to interact with instantiated Situations. Manual interaction can serve to enhance the efficacy of the automated data monitoring process. Manual interaction allows the user to monitor the progress of the automated monitoring and assess a threat during its evolution. The user can make course corrections as the Situation evolves to provide feedback into the process to ensure the automation does not run open loop. The user can review the data collected in the situation tracking object (the data state of the Situation) and make adjustments by adding artifacts, modifying artifacts (e.g., their Roles metadata, Relationship metadata, etc.), and so on. The user can invoke or terminate responder skills as well.
At operation 410, the automation framework can terminate previously invoked responder skills. In some embodiments, for example, the situation engine can terminate invoked responder skills as the state of the Situation changes. For example, if a skill had been invoked because an artifact was associated with a specific role, and the role of that artifact subsequently changed, the invoked skill may no longer be relevant and accordingly may be terminated. In some embodiments, a responder skill may be associated with termination criteria which, when met, will cause the situation engine to terminate that skill, or the skill can self-terminate. The criteria can be based on one or more artifacts in the situation tracking object, their associated metadata, combinations of artifacts and metadata, and so on. In other embodiments, skills can self-terminate. For example, a skill can terminate based on the data state of the situation tracking object, after a period of time, and so on.
At decision point 412, if the Situation is closed out, then processing of the Situation can be deemed complete. For example, the Situation can be deemed to be resolved and the situation can close out the Situation; e.g., the situation tracking object can be archived. The Situation can be explicitly closed out by the user. If the situation engine does not receive any communication from its invoked responder skills or from a user for a period of time, the situation can be closed out due to the inactivity. If the Situation is not closed out, the automation framework can continue processing according to operation 404.
With each pass through operations 404-410, the situation tracking object can evolve based on information collected at operations 406 and 408. Each time operation 404 is performed additional responder skills may be invoked to collect additional data based on the current data state of the Situation. Likewise, invoked responder skills may be terminated at operation 410 based on the state of the Situation. As such, the data that accumulates for the Situation can remain relevant even as the threat landscape continues to evolve because new skills can be invoked to collect new kinds of data as the Situation changes, and old skills can be terminated to avoid collecting information that may no-longer be relevant. Moreover, because the situation engine automatically adjusts the invoked skills based on the situation tracking object, the automation reduces the user's effort in monitoring the Situation.
Activity Monitor
Referring to
At operation 602, the activity monitor can detect activity in the network that is associated with an existing threat or represents a new threat.
At decision point 604, if there are any instantiated situations containing artifacts that are directly associated with the detected activity, then the activity monitor can proceed to operation 614 to enrich each such situation by modifying one or more existing entries in the respective situation tracking object based on the detected activity. For example, if a device was found to be downloading additional information from a domain that already exists within one or more Situations, the relationship between that device and domain can be enriched with additional information such as the amount of data that has been downloaded. As another example, if a user is observed for the first time for a device, the user can be added to the Situation and linked to the device with an associated data relationship.
At decision point 606, if there are any instantiated situations containing artifacts that are related to the detected activity, then the activity monitor can proceed to operation 616 to expand each such situation by adding one or more new entries to the respective situation tracking object based on the detected activity. In some embodiments, for example, the activity monitor can access the security knowledge graph to determine if the detected activity relates to any existing artifacts in an instantiated Situation. For example, if a suspected malicious domain that exists within one or more Situations has been communicated with by one or more new devices, the aforementioned Situations would be expanded to include the newly-implicated devices, an action artifact will be added for the communication between the new device and the malicious domain, and an action participant relationship will be created between the device and the domain.
At decision point 608, if the detected activity was used to either enrich or expand an instantiated Situation, then there would be no need to instantiate a new Situation to monitor the activity because the detected activity was deemed to be associated with an on-going threat and processing can return to operation 602 to continue monitoring for more activity. If the detected activity was not used to enrich or expand an instantiated Situation, then the activity can be deemed to represent a new threat that calls for a new Situation to monitor the new threat. Accordingly, processing can proceed to operation 618 to instantiate a Situation to monitor the new activity. Processing can return to operation 602 to monitor for further activity.
Bus subsystem 704 can provide a mechanism that enables the various components and subsystems of computer system 700 to communicate with each other as intended. Although bus subsystem 704 is shown schematically as a single bus, alternative embodiments of the bus subsystem can utilize multiple busses.
Network interface subsystem 716 can serve as an interface for communicating data between computer system 700 and other computer systems or networks. Embodiments of network interface subsystem 716 can include, e.g., an Ethernet card, a Wi-Fi and/or cellular adapter, a modem (telephone, satellite, cable, ISDN, etc.), digital subscriber line (DSL) units, and/or the like.
User interface input devices 712 can include a keyboard, pointing devices (e.g., mouse, trackball, touchpad, etc.), a touch-screen incorporated into a display, audio input devices (e.g., voice recognition systems, microphones, etc.) and other types of input devices. In general, use of the term “input device” is intended to include all possible types of devices and mechanisms for inputting information into computer system 700, for example to deploy, troubleshoot, and perform maintenance on the computer system.
User interface output devices 714 can include a display subsystem, a printer, or non-visual displays such as audio output devices, etc. The display subsystem can be, e.g., a flat-panel device such as a liquid crystal display (LCD) or organic light-emitting diode (OLED) display. In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from computer system 700, for example to deploy, troubleshoot, and perform maintenance on the computer system.
In some embodiments, the input and output devices can also give the user access to security appliance 102. In other embodiments, security appliance 102 can execute a web application (not shown) that is served over the network interface to provide a web interface for users to access the security appliance.
Data subsystem 706 includes memory subsystem 708 and file/disk storage subsystem 710 represent non-transitory computer-readable storage media that can store program code and/or data, which when executed by processor 702, can cause processor 702 to perform operations in accordance with embodiments of the present disclosure.
Memory subsystem 708 includes a number of memories including main random access memory (RAM) 718 for storage of instructions and data during program execution and read-only memory (ROM) 720 in which fixed instructions are stored. File storage subsystem 710 can provide persistent (i.e., non-volatile) storage for program and data files, and can include a magnetic or solid-state hard disk drive, an optical drive along with associated removable media (e.g., CD-ROM, DVD, Blu-Ray, etc.), a removable flash memory-based drive or card, and/or other types of storage media known in the art.
It should be appreciated that computer system 700 is illustrative and many other configurations having more or fewer components than system 700 are possible.
In accordance with the present disclosure, a method for monitoring a threat in a network includes instantiating a tracking data object to represent a threat state of the threat and to track the threat state of the threat, the tracking data object comprising one or more artifacts; determining one or more first data monitoring processes based on an initial threat state of the threat; invoking the one or more first data monitoring processes to detect events in the network and to monitor network traffic in the network including network traffic associated with the one or more artifacts; updating the threat state of the threat by storing data collected by the one or more data monitoring processes that are associated with the threat into the tracking data object; and determining and invoking additional data monitoring processes based on updates to the threat state of the threat.
In accordance with some embodiments, instantiating the tracking data object includes receiving information associated with the threat and storing the received information into the tracking data object, wherein the initial threat state of the threat comprises the stored information. Further in accordance with some embodiments, the method includes receiving the information associated with the threat from a user.
In accordance with some embodiments, updating the threat state of the threat further includes one or more of the data monitoring processes adding artifacts to the tracking data object or removing artifacts from the tracking data object.
In accordance with some embodiments, updating the threat state of the threat further includes receiving input from a human user.
In accordance with some embodiments, the method further includes terminating previously invoked data monitoring processes based on updates to the threat state of the threat.
In accordance with some embodiments, the method further includes maintaining a knowledge graph representative of nodes comprising the network, attributes of the nodes, and relationships among the nodes; and using the node attributes and relationships among the nodes to identify which data collected by the one or more data monitoring processes are associated with the threat. In accordance with some embodiments, the method further includes updating the knowledge graph based on data collected by the one or more data monitoring processes.
In accordance with the present disclosure, device in a network comprises one or more computer processors; and a computer-readable storage medium comprising instructions for controlling the one or more computer processors to: (a) detect activity that represents a threat; (b) invoke a set of monitor processes based on a current threat state of the threat to monitor activity in the network; (c) update the threat state of the threat based on activity detected by the set of invoked monitor processes; (d) change the set of invoked monitor processes based on the updated threat state of the threat; and (e) repeat (c) and (d).
In accordance with some embodiments, changing the set of invoked monitor processes occurs absent input from a user.
In accordance with some embodiments, the threat state of the threat is represented by a tracking data object, wherein the current threat state of the threat is represented by a current data state of the tracking data object. Further in accordance with some embodiments, updating the threat state of the threat includes updating the tracking data object with data collected by the set of invoked monitor processes.
In accordance with some embodiments, wherein the threat state of the threat is represented by a tracking data object representing network objects and actions related to the threat, wherein the network objects and actions are associated with roles that represent their involvement in the threat, wherein the set of monitor processes are invoked based at least on the roles of the network objects and actions. Further in accordance with some embodiments, changing the set of invoked monitor processes is based at least on the roles of the network objects and actions.
In accordance with some embodiments, changing the set of invoked monitor processes includes one or more of terminating execution of a monitor process in the set of invoked monitor processes and invoking one or more additional monitor processes.
In accordance with some embodiments, changing the set of invoked monitor processes includes receiving input from a user to either (1) terminate execution of a monitor process in the set of invoked monitor processes or (2) invoke an additional monitor process.
In accordance with the present disclosure, a method includes detecting activity that represents a threat; and tracking the threat absent input from the user, including: (a) invoking a set of monitor processes based on a current threat state of the threat to monitor activity in the network; (b) updating the threat state of the threat based on activity detected by the one or more monitor processes; (c) changing the set of invoked monitor processes based on the updated threat state of the threat; and (d) repeating (b) and (c).
In accordance with some embodiments, the threat state of the threat is represented by a tracking data object, wherein the current threat state of the threat is represented by a current data state of the tracking data object. Further in accordance with some embodiments, updating the threat state of the threat includes updating the tracking data object with data collected by the set of invoked monitor processes.
In accordance with some embodiments, changing the set of invoked monitor processes includes (1) terminating execution of a monitor process in the set of invoked monitor processes and/or (2) invoking an additional monitor process.
The above description illustrates various embodiments of the present disclosure along with examples of how aspects of the present disclosure may be implemented. The above examples and embodiments should not be deemed to be the only embodiments, and are presented to illustrate the flexibility and advantages of the present disclosure as defined by the following claims. Based on the above disclosure and the following claims, other arrangements, embodiments, implementations and equivalents may be employed without departing from the scope of the disclosure as defined by the claims.
Park, Matthew, Pearson, David, Golomb, Gary, Amidon, Keith, Polakow, Jeff
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
11729204, | Mar 29 2019 | GOOGLE LLC | System and method for cybersecurity threat monitoring using dynamically-updated semantic graphs |
20170063917, | |||
20180324212, | |||
20220303301, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 03 2021 | AMIDON, KEITH | ARISTA NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056484 | /0590 | |
Jun 03 2021 | POLAKOW, JEFF | ARISTA NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056484 | /0590 | |
Jun 04 2021 | PARK, MATTHEW | ARISTA NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056484 | /0590 | |
Jun 04 2021 | GOLOMB, GARY | ARISTA NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056484 | /0590 | |
Jun 07 2021 | PEARSON, DAVID | ARISTA NETWORKS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 056484 | /0590 | |
Jun 09 2021 | ARISTA NETWORKS, INC. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jun 09 2021 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Aug 20 2027 | 4 years fee payment window open |
Feb 20 2028 | 6 months grace period start (w surcharge) |
Aug 20 2028 | patent expiry (for year 4) |
Aug 20 2030 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 20 2031 | 8 years fee payment window open |
Feb 20 2032 | 6 months grace period start (w surcharge) |
Aug 20 2032 | patent expiry (for year 8) |
Aug 20 2034 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 20 2035 | 12 years fee payment window open |
Feb 20 2036 | 6 months grace period start (w surcharge) |
Aug 20 2036 | patent expiry (for year 12) |
Aug 20 2038 | 2 years to revive unintentionally abandoned end. (for year 12) |